Security+ Chapter 1 review

Card Set Information

Author:
Anonymous
ID:
252944
Filename:
Security+ Chapter 1 review
Updated:
2013-12-13 00:46:48
Tags:
Comptia
Folders:
Comptia
Description:
Security+ Chapter 1 review
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user Anonymous on FreezingBlue Flashcards. What would you like to do?


  1. You want to ensure that data is only view able by authorized users. What security principle are you trying to enforce?
    A. Confidentiality
    B. Availability 
    C. Authentication
    D. Integrity
    A. Confidentiality ensures that data is only viewable by authorized users and can be ensured with accesscontrols and encryption. Integrity is enforced with hashing. Availability can be ensured with power and coolingsystems, and various fault tolerance and redundancy techniques. Authentication proves a person’s identity and isa first step in access control, but by itself it does not provide confidentiality.
    (this multiple choice question has been scrambled)
  2. Of the following choices, what is the best way to protect the confidentiality of data?
    A. Authentication
    B. Encryption
    C. Hashing
    D. PaaS
    B. Encryption protects the confidentiality of data. You can encrypt any type of data, including sensitivedata stored on a server, a desktop, a mobile device, or within a database. Authentication proves a person’sidentity and is a first step in access control, but, by itself, it does not provide confidentiality. Hashing ensures theintegrity of data. Platform as a Service (PaaS) provides an easy to configure operating system for on-demandcloud computing.
    (this multiple choice question has been scrambled)
  3. You want to ensure that data has not been changed between the time when it was sent and when itarrived at its destination. What provides this assurance?
    A. Authentication
    B. Availability
    C. Confidentiality
    D. Integrity
    D. Integrity provides assurances that data has not been modified and is enforced with hashing.Confidentiality prevents unauthorized disclosure and is enforced with access controls and encryption. Availabilityensures systems are up and operational when needed and uses fault tolerance and redundancy methods.Authentication provides proof that users are who they claim to be.
    (this multiple choice question has been scrambled)
  4. A database administrator is tasked with increasing the retail prices of all products in a database by 10percent. The administrator writes a script performing a bulk update of the database and executes it. However, allretail prices are doubled (increased by 100 percent instead of 10 percent). What has been lost?
    A. Confidentiality
    B. Integrity
    C. Hashing
    D. Authentication
    C. The database has lost integrity through an unintended change. Loss of confidentiality indicates thatunauthorized users have accessed the database. Hashing can be used to verify integrity in some situations(though not in this scenario), but hashing would not be compromised. Authentication provides proof that usersare who they claim to be.
    (this multiple choice question has been scrambled)
  5. Your organization is addressing single points of failure as potential risks to security. What are theyaddressing?
    A. Availability
    B. Confidentiality
    C. Integrity
    D. Authentication
    A. By addressing a single point of failure (SPOF), you increase availability. An SPOF can be a drive, a server,power, cooling or any other item whose failure will cause the entire system to fail. Confidentiality is enforced withencryption, and integrity is enforced with hashing, Authentication provides proof of a user’s identity.
    (this multiple choice question has been scrambled)
  6. An organization hosts several bays of servers used to support a large online ecommerce business. Whichone of the following choices would increase the availability of this datacenter?
    A. Hashing
    B. Integrity
    C. Encryption
    D. Generators
    D. Generators can provide power to a datacenter if the power fails, ensuring that the servers within thedatacenter continue to operate. Encryption increases the confidentiality of data within the datacenter. Hashingverifies integrity.
    (this multiple choice question has been scrambled)
  7. You are planning to host a free online forum for users to share IT security-related information with eachother. Any user can anonymously view data. Users can post messages after logging in, but you do not wantusers to be able to modify other users’ posts. What levels of confidentiality, integrity, and availability should youseek?
    A. High confidentiality, low integrity, and low availability
    B. Low confidentiality, low integrity, and low availability
    C. Medium confidentiality, low integrity, and high availability
    D. Low confidentiality, medium integrity, and medium availability
    D. Data can be viewed anonymously, so low confidentiality is acceptable. You do not want users to modifyother users’ posts, so integrity is medium. The site is free but you do want users to be able to access it whenneeded, so availability is medium.
    (this multiple choice question has been scrambled)
  8. What is the purpose of risk mitigation? A. Reduce the chances that a threat will exploit a vulnerability B. Reduce the chances that a vulnerability will exploit a threat C. Eliminate risk D. Eliminate threats
    A. Risk mitigation reduces the chances that a threat will exploit a vulnerability. Risk is the likelihood that athreat (such as an attacker) will exploit a vulnerability (any weakness). A vulnerability cannot exploit a threat. Youcannot eliminate risk or eliminate threats.
  9. What is completed when a user’s password has been verified?
    A. Access verification
    B. Authorization
    C. Identification
    D. Authentication
    D. A user is authenticated when the password is verified. The user claims an identity with a username.After authentication, users are authorized to access resources based on their identity, and auditing can verifywhat resources a user has accessed.
    (this multiple choice question has been scrambled)
  10. Which of the following formulas represent the complexity of a password policy that requires users to useonly upper and lower case letters with a length of eight characters?
    A. 26^8
    B. 52^8
    C. 8^26
    D. 8^52
    B. The correct formula is 52^8. The formula to calculate the complexity of a password is C^N, where C isthe number of possible characters used and N is the length of the password. Since both uppercase (A-Z) andlowercase (a-z) characters are used, C is fifty-two, and the password has a stated length of eight characters.
    (this multiple choice question has been scrambled)
  11. Of the following choices, what password has a dissimilar key space than the others?
    A. Secur1tyIsFun
    B. IL0ve$ecur1ty
    C. Passw0rd
    D. 4uBetutaOn
    B. IL0ve$ecur1ty has 13 characters with a mixture of all four character types (uppercase letters,lowercase letters, numbers, and symbols). This has a larger key space (more possibilities) than the otherpasswords. Secur1ty, Passw0rd, and 3uBetuta each use only three character types.
    (this multiple choice question has been scrambled)
  12. Robert lets you know that he is using his username as his password since it’s easier to remember. Youdecide to inform the user that this isn’t a secure password. What explanation would you include?
    A. The password is not complex
    B. The password is too hard to remember
    C. The password wouldn’t meet account lockout requirements
    D. The password is not long enough
    A. Strong passwords do not include any part of a username, and if just the username is used, thepassword would not be complex. Password characteristics are not related to account lockout (where a useraccount can be locked out after entering the wrong password too many times). A username as a passwordwould not be difficult to remember. Users with long names could have extremely long passwords so they willlikely meet length requirements.
    (this multiple choice question has been scrambled)
  13. Your organization has implemented a self-service password reset system. What does this provide?
    A. Certificate reset
    B. Password policy
    C. Password recovery
    D. Previous logon notification
    C. A self-service password reset system allows users to recover passwords without administrativeintervention. A password policy ensures that users create strong passwords and change them periodically. Apassword reset system does not reset certificates. A previous logon notification provides notification to userswhen they last logged on and can help them identify if someone else is using their account.
    (this multiple choice question has been scrambled)
  14. A user entered the incorrect password for his account three times in a row and can no longer log onbecause his account is disabled. What caused this?
    A. Password policy
    B. Account complexity policy
    C. Account disablement policy
    D. Account lockout policy
    D. An account lockout policy will force an account to be locked out after the wrong password is entereda set number of times (such as after three failed attempts). A password policy ensures strong passwords areused and users change their password regularly. An account disablement policy refers to disabling inactiveaccounts, such as after an employee is terminated. A password policy ensures users create strong, complexpasswords, but there is no such thing as an account complexity policy.
    (this multiple choice question has been scrambled)
  15. A user is issued a token with a number displayed in an LCD. What does this provide?
    A. PIV
    B. CAC
    C. Rolling password for one-time use
    D. Multifactor authentication
    C. A token (such as an RSA token) provides a rolling password for one-time use. While it can be usedwith multifactor authentication (requiring the user to also enter other information such as a password), it doesn’tprovide multifactor authentication by itself. A CAC and a PIV are both specialized types of smart cards thatinclude photo identification.
    (this multiple choice question has been scrambled)
  16. Which one of the following includes a photo and can be used as identification? (Choose all that apply.)
    A. CAC
    B. MAC
    C. DAC
    D. PIV
    A, D. A common access card (CAC) and a personal identity verification (PIV) card both include photoidentification and function as smart cards. MAC and DAC are access control models, not photo IDs.
  17. Which of the following is a behavioral biometric authentication model?
    A. Iris scan
    B. Token
    C. Voice recognition
    D. Fingerprint
    C. Voice recognition is a form of behavioral biometric authentication. Biometrics are the most difficult foran attacker to falsify or forge, because they represent a user based on personal characteristics. Fingerprints andiris scans are forms of physical biometric authentication. A token provides a rolling password for one-time use.
    (this multiple choice question has been scrambled)
  18. Which of the following is an example of multifactor authentication?
    A. Thumbprint and voice recognition
    B. Password and PIN
    C. Smart card and token
    D. Smart card and PIN
    D. A smart card and PIN is an example of multifactor authentication since it uses methods from thesomething you have factor and something you know factor. A smart card and token are both in the somethingyou have factor. Thumbprint and voice recognition are both in the something you are factor. A password andPIN are both in the something you know factor.
    (this multiple choice question has been scrambled)
  19. Which of the following choices is an example of using multiple authentication factors?
    A. Fingerprint and password
    B. A password and a PIN
    C. Smart card and token
    D. Fingerprint and retina scan
    A. A fingerprint uses the something you are factor, and a password uses the something you know factor.All the other answers use examples from the same factor. A fingerprint and retina are both examples of thesomething you are factor. A smart card and token are both examples of the something you have factor. Apassword and a PIN are both examples of the something you know factor.
    (this multiple choice question has been scrambled)
  20. Of the following choices, what provides the strongest authentication?
    A. Smart card
    B. Multifactor authentication
    C. Password
    D. Retina scan
    B. Multifactor authentication combines two or more other factors of authentication and is stronger thanany authentication using a single factor. A password is something you know, a smart card is something you have,and a retina scan is based on something you are.
    (this multiple choice question has been scrambled)
  21. What is used for authentication in a Microsoft Active Directory domain?
    A. Kerberos
    B. RADIUS
    C. NIDS
    D. TACACS+
    A. Kerberos is used as a network authentication protocol in Microsoft Active Directory domains and inUNIX realms. Kerberos uses tickets issued by a KDC. RADIUS and TACACS+ are central authentication servicesthat also provide authorization and accounting. A network-based intrusion detection service (NIDS) attempts todetect intrusions on a network.
    (this multiple choice question has been scrambled)
  22. Which of the following best describes the purpose of LDAP?
    A. Prevent loss of confidentiality
    B. Biometric authentication
    C. Prevent loss of integrity
    D. A central point for user management
    D. The Lightweight Directory Access Protocol (LDAP) specifies formats and methods to query directoriesand is used to manage objects (such as users and computers) in an Active Directory domain. LDAP is notassociated with biometrics. While LDAP contributes indirectly to confidentiality and integrity, it is more accurateto say that LDAP is used as a central point for user management.
    (this multiple choice question has been scrambled)
  23. A federated user database is used to provide central authentication via a web portal. What service doesthis database provide?
    A. SSO
    B. DAC
    C. CAC
    D. Multifactor authentication
    A. Single sign-on (SSO) can be used to provide central authentication with a federated database and usethis authentication in a nonhomogeneous environment. Multifactor authentication uses authentication from twoor more factors. A common access card (CAC) is a form of photo identification and also function as a smart card.DAC is an access control model.
    (this multiple choice question has been scrambled)
  24. Of the following protocols, which one does not encrypt the entire authentication process, but insteadonly encrypts the password in traffic between the client and server?
    A. Token
    B. XTACACS
    C. RADIUS
    D. TACACS+
    C. Remote Authentication Dial-In User Service (RADIUS) will encrypt the password packets between aclient and a server, but it does not encrypt the entire authentication process. Terminal Access Controller Access-Control System + (TACACS+) and Extended TACACS (XTACACS) both encrypt the entire logon process. A tokenuses a one-time rolling password, but it is not a protocol in itself.
    (this multiple choice question has been scrambled)
  25. Which one of the following AAA protocols uses multiple challenges and responses?
    A. TACACS
    B. RADIUS
    C. CHAP
    D. TACACS+
    D. TACACS+ uses multiple challenges and responses and is an authentication, authorization, andaccounting (AAA) protocol. CHAP is not an AAA protocol. RADIUS and TACACS do not use multiple challengesand responses.
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview